From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Original-To: caml-list@sympa.inria.fr Delivered-To: caml-list@sympa.inria.fr Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) by sympa.inria.fr (Postfix) with ESMTPS id 2B88A7FA4D for ; Wed, 30 Jul 2014 17:32:03 +0200 (CEST) Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of grace.sdiwc@gmail.com) identity=pra; client-ip=209.85.219.42; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="grace.sdiwc@gmail.com"; x-sender="grace.sdiwc@gmail.com"; x-conformance=sidf_compatible Received-SPF: Pass (mail3-smtp-sop.national.inria.fr: domain of grace.sdiwc@gmail.com designates 209.85.219.42 as permitted sender) identity=mailfrom; client-ip=209.85.219.42; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="grace.sdiwc@gmail.com"; x-sender="grace.sdiwc@gmail.com"; x-conformance=sidf_compatible; x-record-type="v=spf1" Received-SPF: None (mail3-smtp-sop.national.inria.fr: no sender authenticity information available from domain of postmaster@mail-oa0-f42.google.com) identity=helo; client-ip=209.85.219.42; receiver=mail3-smtp-sop.national.inria.fr; envelope-from="grace.sdiwc@gmail.com"; x-sender="postmaster@mail-oa0-f42.google.com"; x-conformance=sidf_compatible X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AqYHAFwP2VPRVdsqlGdsb2JhbABAEQmDYFcEgnSBHMZ5hnhNBIEKCBYQAQEBAQcLCwkSK4QcCwYdARgDDBIDEgMNBzACJAERAQUBDicUDogLAQMRDTaLd40IgxVqiymBcoMQiwcKGScNZIY2AQUOjA+CTQcDBwGDUIFRBYYEhHmQZ4FSjFOEPBgphQcwL4EDCRc X-IPAS-Result: AqYHAFwP2VPRVdsqlGdsb2JhbABAEQmDYFcEgnSBHMZ5hnhNBIEKCBYQAQEBAQcLCwkSK4QcCwYdARgDDBIDEgMNBzACJAERAQUBDicUDogLAQMRDTaLd40IgxVqiymBcoMQiwcKGScNZIY2AQUOjA+CTQcDBwGDUIFRBYYEhHmQZ4FSjFOEPBgphQcwL4EDCRc X-IronPort-AV: E=Sophos;i="5.01,764,1400018400"; d="scan'208";a="73367595" Received: from mail-oa0-f42.google.com ([209.85.219.42]) by mail3-smtp-sop.national.inria.fr with ESMTP/TLS/RC4-SHA; 30 Jul 2014 17:32:02 +0200 Received: by mail-oa0-f42.google.com with SMTP id n16so1067009oag.29 for ; Wed, 30 Jul 2014 08:32:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=NQr1cFFpzkakmNKjUQDcjnUUQ28I7WDykWBs4E1P9Vo=; b=rqacYUfmJSTro2CyyAB0vQgxgZTt+FeDhei4PCjU+/vgNHWAWXFC/esI8C2IkPjsoe cCT8uB4NwnGBIzyJRpaG8KDXuQT4D7MO1RvvCKv6zkgojDseaLkXsTyEFyoshtcz4NRX fxrUjVkpgf8LjEkBeYDGz7JXeetwTAltcnLTPmUhwPTueMnmgoArzRLShTxmTMiyME8I Bpa81Xf5yPjuctq5913XUFzQo8RLU6av/fpEMSTpQ4vPtNsIl9mOOpj1hHcus2h0w2tV DWT2H+k8I9nOesp1Z43Y/z45a0ks+/iacSn39NUh7irYOekyUovr90rFINiWYM29sey4 42Jg== MIME-Version: 1.0 X-Received: by 10.60.145.161 with SMTP id sv1mr7564842oeb.56.1406734320550; Wed, 30 Jul 2014 08:32:00 -0700 (PDT) Received: by 10.182.220.9 with HTTP; Wed, 30 Jul 2014 08:32:00 -0700 (PDT) Date: Wed, 30 Jul 2014 23:32:00 +0800 Message-ID: From: Grace Allas To: tccn@COMSOC.ORG Content-Type: multipart/alternative; boundary=047d7b5d3d067846bb04ff6adb71 X-Validation-by: grace.sdiwc@gmail.com Subject: [Caml-list] Call for Papers: The ISDF2014 Conference in Greece --047d7b5d3d067846bb04ff6adb71 Content-Type: text/plain; charset=UTF-8 [My apology for receiving multiple copies] ------------------------------------------------------------ http://sdiwc.net/conferences/isdf2014/ December 12-14, 2014 The International Conference in Information Security, and Digital Forensics (ISDF2014) AMC Metropolitan College, Thessaloniki, Greece All registered papers will be included in SDIWC Digital Library. ============================================================== The conference aims to enable researchers build connections between different digital applications. The event will be held over three days, with presentations delivered by researchers from the international community, including presentations from keynote speakers and state-of-the-art lectures. RESEARCH TOPICS ARE NOT LIMITED TO: ~~ Cyber Security - Distributed and Pervasive System Security - Formal Methods Application in Security - Incident Handling and Penetration Testing - Multimedia and Document Security - Privacy Issues - Secure Software Development, Architecture and Outsourcing - Security in Cloud Computing - Security of Web-based Applications and Services - VOIP, Wireless and Telecommunications Network Security - Enterprise System Security - Hardware-Based Security - Legal issues - Operating System and Database - SCADA and Embedded Systems - Security for Future Networks - Security in Social Networks ~~ Digital Forensics - Anti-Forensics and Anti-Forensics Techniques - Data leakage, Data protection and Database forensics - Executable Content and Content Filtering - Forensics of Virtual and Cloud Environments - Investigation of Insider Attacks - Malware forensics, and Anti-Malware Techniques - New Treats and Non-Traditional approaches - Cyber-Crimes - Evidentiary Aspects of Digital Forensics - File System and Memory Analysis Multimedia Forensics - Information Hiding - Large Scale Investigations - Network Forensics and Traffic Analysis Hardware Vulnerabilities and Device Forensics ~~ Information Assurance and Security Management - Business Continuity & Disaster Recovery Planning - Critical Infrastructure Protection - Digital Rights Management and Intellectual Property Protection - Fraud Management - Laws and Regulations - Corporate Governance - Decidability and Complexity - Economics of Security - Treats, Vulnerabilities, and Risk Management - Identity Management - Security Policies and Trust Management Researchers are encouraged to submit their work electronically. All papers will be fully refereed by a minimum of two specialized referees. Before final acceptance, all referees comments must be considered. Paper Submission: http://sdiwc.net/conferences/isdf2014/openconf/openconf.php IMPORTANT DATES: Submission Deadline : open from now until October 12, 2014 Notification of Acceptance : November 12, 2014 or 4 weeks after the submission date Camera Ready Submission : December 02, 2014 Registration Date : December 02, 2014. It is recommended to do it few days before Conference Dates : December 12-14, 2014 Contact email: isdf14@sdiwc.net --047d7b5d3d067846bb04ff6adb71 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
[My apology for receiving multiple copies]
= ------------------------------------------------------------

=
December 12-14, 2014

The Internatio= nal Conference in Information Security, and Digital Forensics (ISDF2014)
AMC Metropolitan College, Thessaloniki, Greece

All registered papers will be included in SDIWC Digital Library.=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
The conference a= ims to enable researchers build connections between different digital appli= cations. The event will be held over three days, with presentations deliver= ed by researchers from the international community, including presentations= from keynote speakers and state-of-the-art lectures.


RESEARCH TOPICS ARE NOT LIMITED TO:

~~ Cyber Security
- Distributed and Pervasiv= e System Security
- Formal Methods Application in Security
- Incident Handling and Penetration Testing
- Multimedia and= Document Security
- Privacy Issues
- Secure Software D= evelopment, Architecture and Outsourcing
- Security in Cloud Comp= uting
- Security of Web-based Applications and Services
- VOIP, Wi= reless and Telecommunications Network Security
- Enterprise Syste= m Security
- Hardware-Based Security
- Legal issues
- Operating System and Database
- SCADA and Embedded Systems=
- Security for Future Networks
- Security in Social Ne= tworks
~~ Digital Forensics
- Anti-Forensics and Anti-F= orensics Techniques
- Data leakage, Data protection and Database forensics
- Exe= cutable Content and Content Filtering
- Forensics of Virtual and = Cloud Environments
- Investigation of Insider Attacks
- Malware forensics, and =C2=A0Anti-Malware Techniques
- New Trea= ts and Non-Traditional approaches
- Cyber-Crimes
- Evid= entiary Aspects of Digital Forensics
- File System and Memory Ana= lysis Multimedia Forensics
- Information Hiding
- Large Scale Investigations
= - Network Forensics and Traffic Analysis Hardware Vulnerabilities and Devic= e Forensics
~~ Information Assurance and Security Management
- Business Continuity & Disaster Recovery Planning
- Cri= tical Infrastructure Protection
- Digital Rights Management and I= ntellectual Property Protection
- Fraud Management=C2=A0
- Laws and Regulations
- Corporate Governance
- Decidab= ility and Complexity
- Economics of Security
- Treats, = Vulnerabilities, and Risk Management
- Identity Management
- Security Policies and Trust Management

Rese= archers are encouraged to submit their work electronically. All papers will= be fully refereed by a minimum of two specialized referees.=C2=A0
Before final acceptance, all referees comments must be considered.=C2=A0


IMPORTANT DATES:

Submission De= adline =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: open from now until Octob= er 12, 2014
Notification of Acceptance =C2=A0 =C2=A0: November 12= , 2014 or 4 weeks after the submission date
Camera Ready Submission =C2=A0: December 02, 2014
Registrati= on Date =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : December = 02, 2014. It is recommended to do it few days before
Conference D= ates =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: December 12-1= 4, 2014

Contact email: isdf= 14@sdiwc.net
--047d7b5d3d067846bb04ff6adb71--